Search

Robert A Hullinger

Examiner (ID: 12417)

Most Active Art Unit
2825
Art Unit(s)
2813, 2825
Total Applications
24
Issued Applications
24
Pending Applications
0
Abandoned Applications
0

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 7991131 [patent_doc_number] => 08077870 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-12-13 [patent_title] => 'Cryptographic key split binder for use with tagged data elements' [patent_app_type] => utility [patent_app_number] => 12/906906 [patent_app_country] => US [patent_app_date] => 2010-10-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 10770 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/077/08077870.pdf [firstpage_image] =>[orig_patent_app_number] => 12906906 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/906906
Cryptographic key split binder for use with tagged data elements Oct 17, 2010 Issued
Array ( [id] => 6154722 [patent_doc_number] => 20110023121 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-27 [patent_title] => 'DETECTION OF UNDESIRED COMPUTER FILES IN DAMAGED ARCHIVES' [patent_app_type] => utility [patent_app_number] => 12/899056 [patent_app_country] => US [patent_app_date] => 2010-10-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7718 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0023/20110023121.pdf [firstpage_image] =>[orig_patent_app_number] => 12899056 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/899056
Detection of undesired computer files in damaged archives Oct 5, 2010 Issued
Array ( [id] => 5996994 [patent_doc_number] => 20110016530 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-20 [patent_title] => 'DETECTION OF UNDESIRED COMPUTER FILES IN ARCHIVES' [patent_app_type] => utility [patent_app_number] => 12/893094 [patent_app_country] => US [patent_app_date] => 2010-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7834 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0016/20110016530.pdf [firstpage_image] =>[orig_patent_app_number] => 12893094 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/893094
Detection of undesired computer files in archives Sep 28, 2010 Issued
Array ( [id] => 6153705 [patent_doc_number] => 20110022846 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-27 [patent_title] => 'Systems and Methods for Secure Transaction Management and Electronic Rights Protection' [patent_app_type] => utility [patent_app_number] => 12/893901 [patent_app_country] => US [patent_app_date] => 2010-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 147 [patent_figures_cnt] => 147 [patent_no_of_words] => 180893 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20110022846.pdf [firstpage_image] =>[orig_patent_app_number] => 12893901 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/893901
Systems and methods for secure transaction management and electronic rights protection Sep 28, 2010 Issued
Array ( [id] => 6032561 [patent_doc_number] => 20110081886 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-04-07 [patent_title] => 'SYSTEMS AND METHODS FOR COMMUNICATION PROTECTION' [patent_app_type] => utility [patent_app_number] => 12/886563 [patent_app_country] => US [patent_app_date] => 2010-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6201 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0081/20110081886.pdf [firstpage_image] =>[orig_patent_app_number] => 12886563 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/886563
SYSTEMS AND METHODS FOR COMMUNICATION PROTECTION Sep 19, 2010 Abandoned
Array ( [id] => 8273390 [patent_doc_number] => 08214914 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-07-03 [patent_title] => 'Securing wakeup network events' [patent_app_type] => utility [patent_app_number] => 12/831868 [patent_app_country] => US [patent_app_date] => 2010-07-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3850 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 69 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12831868 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/831868
Securing wakeup network events Jul 6, 2010 Issued
Array ( [id] => 9156775 [patent_doc_number] => 08589689 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-11-19 [patent_title] => 'Apparatus and method for over-the-air (OTA) provisioning of authentication and key agreement (AKA) credentials between two access systems' [patent_app_type] => utility [patent_app_number] => 12/777048 [patent_app_country] => US [patent_app_date] => 2010-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 17899 [patent_no_of_claims] => 54 [patent_no_of_ind_claims] => 14 [patent_words_short_claim] => 74 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12777048 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/777048
Apparatus and method for over-the-air (OTA) provisioning of authentication and key agreement (AKA) credentials between two access systems May 9, 2010 Issued
Array ( [id] => 6006568 [patent_doc_number] => 20110119730 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-19 [patent_title] => 'Enforcing Centralized Communication Policies' [patent_app_type] => utility [patent_app_number] => 12/774619 [patent_app_country] => US [patent_app_date] => 2010-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8426 [patent_no_of_claims] => 58 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0119/20110119730.pdf [firstpage_image] =>[orig_patent_app_number] => 12774619 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/774619
Enforcing Centralized Communication Policies May 4, 2010 Abandoned
Array ( [id] => 6465763 [patent_doc_number] => 20100281527 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-11-04 [patent_title] => 'MONITORING NETWORK TRAFFIC BY USING A MONITOR DEVICE' [patent_app_type] => utility [patent_app_number] => 12/772960 [patent_app_country] => US [patent_app_date] => 2010-05-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9025 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0281/20100281527.pdf [firstpage_image] =>[orig_patent_app_number] => 12772960 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/772960
Monitoring network traffic by using a monitor device May 2, 2010 Issued
Array ( [id] => 8109807 [patent_doc_number] => 08156555 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-04-10 [patent_title] => 'Information processing apparatus, information processing method, information providing medium, information decryption apparatus, and information recording medium' [patent_app_type] => utility [patent_app_number] => 12/766414 [patent_app_country] => US [patent_app_date] => 2010-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8507 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 85 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/156/08156555.pdf [firstpage_image] =>[orig_patent_app_number] => 12766414 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/766414
Information processing apparatus, information processing method, information providing medium, information decryption apparatus, and information recording medium Apr 22, 2010 Issued
Array ( [id] => 6335926 [patent_doc_number] => 20100198838 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-05 [patent_title] => 'MANAGING ADD-ONS' [patent_app_type] => utility [patent_app_number] => 12/758243 [patent_app_country] => US [patent_app_date] => 2010-04-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7280 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0198/20100198838.pdf [firstpage_image] =>[orig_patent_app_number] => 12758243 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/758243
Managing add-ons Apr 11, 2010 Issued
Array ( [id] => 9077756 [patent_doc_number] => 08555348 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-08 [patent_title] => 'Hierarchical trust based posture reporting and policy enforcement' [patent_app_type] => utility [patent_app_number] => 12/714979 [patent_app_country] => US [patent_app_date] => 2010-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9258 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12714979 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/714979
Hierarchical trust based posture reporting and policy enforcement Feb 28, 2010 Issued
Array ( [id] => 7566533 [patent_doc_number] => 20110286596 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-11-24 [patent_title] => 'SYSTEM AND METHODS FOR ENCRYPTION WITH AUTHENTICATION INTEGRITY' [patent_app_type] => utility [patent_app_number] => 13/143172 [patent_app_country] => US [patent_app_date] => 2010-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 17188 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0286/20110286596.pdf [firstpage_image] =>[orig_patent_app_number] => 13143172 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/143172
System and methods for encryption with authentication integrity Jan 27, 2010 Issued
Array ( [id] => 8703831 [patent_doc_number] => 08397067 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-03-12 [patent_title] => 'Mechanisms and techniques for protecting intellectual property' [patent_app_type] => utility [patent_app_number] => 12/693223 [patent_app_country] => US [patent_app_date] => 2010-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 6839 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12693223 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/693223
Mechanisms and techniques for protecting intellectual property Jan 24, 2010 Issued
Array ( [id] => 7983041 [patent_doc_number] => 08074280 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-12-06 [patent_title] => 'Detection of undesired computer files in archives' [patent_app_type] => utility [patent_app_number] => 12/638951 [patent_app_country] => US [patent_app_date] => 2009-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 7884 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 204 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/074/08074280.pdf [firstpage_image] =>[orig_patent_app_number] => 12638951 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/638951
Detection of undesired computer files in archives Dec 14, 2009 Issued
Array ( [id] => 9129079 [patent_doc_number] => 08577035 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-11-05 [patent_title] => 'Electronic circuit for securing data interchanges between a computer station and a network' [patent_app_type] => utility [patent_app_number] => 12/624949 [patent_app_country] => US [patent_app_date] => 2009-11-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 3721 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12624949 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/624949
Electronic circuit for securing data interchanges between a computer station and a network Nov 23, 2009 Issued
Array ( [id] => 6234296 [patent_doc_number] => 20100185859 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-22 [patent_title] => 'SOFTWARE UPDATE SYSTEM, MANAGEMENT APPARATUS, RECORDING MEDIUM, AND INTEGRATED CIRCUIT' [patent_app_type] => utility [patent_app_number] => 12/624739 [patent_app_country] => US [patent_app_date] => 2009-11-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 62 [patent_figures_cnt] => 62 [patent_no_of_words] => 41993 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0185/20100185859.pdf [firstpage_image] =>[orig_patent_app_number] => 12624739 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/624739
Software update system, management apparatus, recording medium, and integrated circuit Nov 23, 2009 Issued
Array ( [id] => 8438467 [patent_doc_number] => 08286253 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-10-09 [patent_title] => 'Data leakage prevention for resource limited device' [patent_app_type] => utility [patent_app_number] => 12/623934 [patent_app_country] => US [patent_app_date] => 2009-11-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 5591 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 144 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12623934 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/623934
Data leakage prevention for resource limited device Nov 22, 2009 Issued
Array ( [id] => 8401165 [patent_doc_number] => 08271555 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-09-18 [patent_title] => 'Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks' [patent_app_type] => utility [patent_app_number] => 12/615332 [patent_app_country] => US [patent_app_date] => 2009-11-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 12 [patent_no_of_words] => 6207 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12615332 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/615332
Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks Nov 9, 2009 Issued
Array ( [id] => 6620964 [patent_doc_number] => 20100050266 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-02-25 [patent_title] => 'Providing Extended Memory Protection' [patent_app_type] => utility [patent_app_number] => 12/606408 [patent_app_country] => US [patent_app_date] => 2009-10-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5442 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0050/20100050266.pdf [firstpage_image] =>[orig_patent_app_number] => 12606408 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/606408
Providing extended memory protection Oct 26, 2009 Issued
Menu